https://bugzilla.redhat.com/show_bug.cgi?id=1793917 Bug ID: 1793917 Summary: perl-Test-mysqld-1.0012-4.fc32 FTBFS: DBI connect('dbname=mysql;mysql_socket=/tmp/B_Fm_kLtjo/tmp /mysql.sock;user=root','',...) failed: Access denied for user 'root'@'localhost' at /builddir/build/BUILD/Test-mysqld-1.0012/blib/lib/Test /mysqld.pm line 143. Product: Fedora Version: rawhide URL: https://koschei.fedoraproject.org/package/perl-Test-my sqld?collection=f32 Status: NEW Component: perl-Test-mysqld Assignee: denis@xxxxxxxxxxx Reporter: ppisar@xxxxxxxxxx QA Contact: extras-qa@xxxxxxxxxxxxxxxxx CC: denis@xxxxxxxxxxx, perl-devel@xxxxxxxxxxxxxxxxxxxxxxx Blocks: 1750908 (F32FTBFS) Target Milestone: --- Classification: Fedora perl-Test-mysqld-1.0012-4.fc32 fails to build in Fedora 32 because tests fail: t/00-base.t ............ ok DBI connect('dbname=mysql;mysql_socket=/tmp/B_Fm_kLtjo/tmp/mysql.sock;user=root','',...) failed: Access denied for user 'root'@'localhost' at /builddir/build/BUILD/Test-mysqld-1.0012/blib/lib/Test/mysqld.pm line 143. Access denied for user 'root'@'localhost' at /builddir/build/BUILD/Test-mysqld-1.0012/blib/lib/Test/mysqld.pm line 143. t/01-raii.t ............ Dubious, test returned 255 (wstat 65280, 0xff00) No subtests run A difference between passing and failing build root is at <https://koschei.fedoraproject.org/build/7747723>. An upgrade of mariadb-server from 3:10.3.21-3.fc32 to 3:10.4.11-1.fc32 looks suspicious. Referenced Bugs: https://bugzilla.redhat.com/show_bug.cgi?id=1750908 [Bug 1750908] Fedora 32 FTBFS Tracker -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@xxxxxxxxxxxxxxxxxxxxxxx